Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: THUMB PRINT AND SIGNATURE RECOGNITION
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Submitted by
Astik Ilame
Gajendra Devikar
Ganesh Ganjare
Lokesh Lonare

[attachment=12958]
INTRODUCTION
Traditionally, passwords (knowledge-based security) and ID cards (token-based security) have been used to moderate access to restricted systems. However, security can be easily breached in these systems when a password is divulged to an unauthorized user or a card is stolen by an impostor. Furthermore, simple passwords are easy to guess (by an impostor) and difficult passwords may be hard to recall (by a legitimate user). The emergence of biometrics has addressed the problems that plague traditional verification methods.
Biometrics refers to the automatic identification (or verification) of an individual (or a claimed identity) by using certain physiological or behavioral traits associated with the person. One such trait is the thumb print or signature of a person.
Thumb prints are not the only features that can be used to build biometric verification systems. There has also been work done to build systems that verify ones identity based on their iris, palm prints, and faces. Thumb prints, however, are one of the better features on which to build a biometric system.
Among the various biometrics that can be used, thumb prints make a good choice because everyone has unique thumb prints .One's thumb prints also do not vary with age making it a biometric whose features do not have to be constantly updated by the verification system. There is a long history of using thumb prints and signature to identify people and verify identity. Thus, the methods used to compare thumb prints are widely known and accepted.
Keeping in mind the above points, we have decided to build a Thumb Print And Signature Recognition System that can be used effectively for any sort of Verification or Identification system.
OBJECTIVE OF THE PROJECT
Among the various biometrics that can be used, thumb prints make a good choice because everyone has unique thumb prints .One's thumb prints also do not vary with age making it a biometric whose features do not have to be constantly updated by the verification system. There is a long history of using thumb prints and signature to identify people and verify identity. Thus, the methods used to compare thumb prints are widely known and accepted.
Keeping in mind the above points, we have decided to build a Thumb Print And Signature Recognition System that can be used effectively for any sort of Verification or Identification system.
Our project “Thumb Print And Signature Recognition” consists of following main modules:
• Maintaining Database
• Searching
Maintaining Database:
This module is used to store the person’s information which is requirement of our project. Person’s information consist of following information:
1. Name
2. Address
3. Phone No
4. Date of Birth
5. Description about that person
6. Photo
7. Thumb prints
8. Signature
This module consist of following function :
Save: This function is used to save the person’s information entered by user in database form. After entering information in the form we click on ‘save’ button and whole information is stored in a database file. If any of the above mentioned field is not entered by user then it gives error and information is not stored.
Modify: This function is used to modify content of the database. If by mistake user enters incorrect information then he wants to modify this information and this can be done by clicking on ‘Modify’ button.
Delete: If we want to remove particular record or whole content of database then we use Delete function. For this we have to select particular record by clicking on them and then click on ‘Delete’ button.
Start Thumb Search: If we want to search a particular thumb print from the database file then we use this function. This search function search the record using thumb print as a key.
Search By Sign: This search function searches a particular signature from the database file using sign as a key.
Search Thumb: This function is used to search the matching thumb print from database.
Search Sign: This function is used to search the matching signature from the database.
New Form: This function is used to fill the information of new person..
Searching: This is the most important step in our project which is called
searching in this we use different algorithms. Here a Binarization module is used. It’s function is to transform grayscale images of the input from the scanner to form(matrix form). Binarization can be achieve using
Thresholding techniques. Each pixel is compared to a threshold value. If the pixel is above the threshold value, it’s value in the matrix is marked as one other wise it is marked as zero. Once such a matrix is obtained,it is compared with matrices of the available finger prints which is
stored in the database. If match is found, the identification is success and record of that particular person is displayed. Other wise it gives message as” Record not found”.
Hardware And Software Requirement
Minimum Hardware Requirement
400 MHz Pentium Processor
32 MB RAM
256 MB Hard Disk Free Space
A4 Size Scanner
Recommended Hardware Requirement
800 MHz Pentium Processor
64 MB RAM
1 GB Hard Disk Free Space
A4 Size Scanner
Software Requirement
Java 1.3/1.4
Microsoft Access Driver Program
Scanner Device Driver